πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Why CSP Isn't Enough to Stop Magecart-Like Attacks πŸ•΄

As Magecart and formjacking attacks become more sophisticated, it's essential to address not only what services may interact with users, but what that interaction looks like and how to control it.

πŸ“– Read

via "Dark Reading: ".
❌ More Than Half of IoT Devices Vulnerable to Severe Attacks ❌

A full 98 percent of all IoT device traffic is unencrypted, exposing personal and confidential data on the network.

πŸ“– Read

via "Threatpost".
πŸ” Media and e-commerce brands are top targets for phishing attacks πŸ”

Some 84% of phishing URLs seen by content delivery network Akamai were abusing media and e-commerce companies.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Trend Micro VP talks cloud security, IoT risks, and ransomware πŸ”

In an interview at RSA 2020, Greg Young, the vice present of cybersecurity at Trend Micro, said that companies need to focus on cloud security posture management to make sure all cloud instances are configured correctly and securely.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Hackers are working harder to make phishing and malware look legitimate πŸ”

A Trend Micro report finds that spammers are using public and hosted cloud infrastructure to slip malicious emails past security defenses.

πŸ“– Read

via "Security on TechRepublic".
❌ New TrickBot Variant Updates Anti-Analysis Tricks ❌

A new TrickBot variant shows that the malware is continuing to swap out new anti-analysis and persistence tactics.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2012-1101

systemd 37-1 does not properly handle non-existent services, which causes a denial of service (failure of login procedure).

πŸ“– Read

via "National Vulnerability Database".
⚠ S2 Ep30: Let’s Encrypt, ULTRASOUND attacks, backups for ransom – Naked Security Podcast ⚠

Listen to the latest episode now!

πŸ“– Read

via "Naked Security".
πŸ•΄ Blacklists Miss 21% of Phishing Attacks, Internet Traffic Reveals πŸ•΄

Visibility into phishing attacks by content delivery networks and security firms shows many domains fail to be classified as malicious.

πŸ“– Read

via "Dark Reading: ".
❌ Wormable, Unpatched Microsoft Bug Threatens Corporate LANs ❌

CVE-2020-0796 affects version 3.1.1 of Microsoft’s SMB file-sharing system and was not included in Patch Tuesday.

πŸ“– Read

via "Threatpost".
⚠ Microsoft leaves critical bug unpatched on Patch Tuesday ⚠

Microsoft fixed bugs across a range of products on patch Tuesday, issuing patches for 115 distinct CVEs, with 26 rated critical.

πŸ“– Read

via "Naked Security".
πŸ•΄ Gender Equality in Cybersecurity Could Drive Economic Boost πŸ•΄

If the number of women in cybersecurity equaled the number of men, the US would see an economic gain up to $30.4 billion, research shows.

πŸ“– Read

via "Dark Reading: ".
⚠ TRRespass research reveals rowhammering is alive and well ⚠

"TRRespass" is a new trick for rowhammering - an attack where you write to a memory chip by reading it over and over (and over) again.

πŸ“– Read

via "Naked Security".
πŸ•΄ How the Rise of IoT Is Changing the CISO Role πŸ•΄

Prepare for the future by adopting a risk-based approach. Following these five steps can help.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2013-1753

The gzip_decode function in the xmlrpc client library in Python 3.4 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP request.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-2487

The implementations of PKCS#1 v1.5 key transport mechanism for XMLEncryption in JBossWS and Apache WSS4J before 1.6.5 is susceptible to a Bleichenbacher attack.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Black Hat Europe πŸ•΄

ExCel London, UK

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Black Hat Asia πŸ•΄

Singapore

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ I Want to Work in Industrial IoT Security. What Lingo Do I Need to Know? πŸ•΄

Should you happen to be in a meeting with an ICS vendor, here are some terms you will need to know so as to not be laughed out of the room.

πŸ“– Read

via "Dark Reading: ".
❌ Phishing Attack Skirts Detection With YouTube ❌

Attackers are using YouTube redirect links, whitelisted by various security defense mechanisms, to evade detection.

πŸ“– Read

via "Threatpost".